Ticker

6/recent/ticker-posts

Header Ads Widget

Responsive Advertisement

5 Types Of Cyber Attack

Types of Computer Attack

The computer has also become a part of our life like smartphones. It brought a revolution in technology. Now, a computer is being used in every field of life. But there are persons named hackers, try different kinds of methods to attack someone’s computer and steal your data. Today, I will talk about these 5 types of computer attacks and you must know about them. Here, I will guide you about 5 types of computer attacks which are dangerous and can harm your computer. So, let’s get started:

1. Phishing

One of the most well known you probably already know about and if you don’t, you definitely should pay attention to is Phishing. This is an essential one to know about. This is basically where a fake website is set up, where you are tricked into entering your real password credentials into a fake website.

So a lot of times you can get an email, for example, you might get a search result in Google that is the fake result of what you think is Amazon or amazon listing but it is like amazon something where they add in little stuff that tricks you into thinking without looking and eventually it looks like the real website because the design is like that and you input your credentials and they have it.

Then, they can either use that login credentials to log in themselves or maybe order things through your real amazon account or they might just bundle of all the credentials they collect and sell them on the dark web and a lot of times the hacker will buy that database or search through them and try that same password there might be one database on several different websites because a lot of people use the same login.

So, this is why you want to check the URL for links you are clicking. Click suspicious links because they might seem legitimate and then you type in your information. It was the first computer attack and you should aware of it to others as well.

2. Spear Phishing

There is another type of phishing known as spear phishing, where the hacker or attacker will specifically target a very small group of people or one individual person and this is a lot harder to detect because a lot of time if they are targeting a specific company or specific department within a company they may handcraft a spam email.

It has a lot of relevant information where it is difficult to detect that it is a scam email because it may be very very similar to a lot of common emails that the department may receive. For example, maybe the sales department at an audio equipment company may get a request that a sales request for big order and they say can you login to this page where we want to place the order.

You get the idea that completely wrong obviously but it’s an example where they may target a specific group of people and they may name that person by the name they will do a lot of research about the company they are sending it to. So, it may come from a competitors email address or something similar to that you get the idea it just makes it much more likely to increase the trust if they use terminology and things that the person or the victim would recognize.

3. Whaling

Now, this next type of attack you may not have heard about it before, and its name is a little bit funny called whaling. It’s basically when an attacker goes towards a high profile target like a company so they may go after executives like CEOs or CTOs (Chief Technology officer) they will go after high-level individuals within an organization.

Its a kind of like spearfishing actually but just for a specific high-value target and a simple reason for that is because if you can get login credentials or whatever for a powerful person within a company obviously you can probably do a lot more damage if you are able to impersonate that person you might be able to get a lower-ranking employee to transfer a bunch of money.

And say “Oh! we got this big sale to send the money to this person” and the lower level employee will believe it because they don’t want to against what the CEO says something like that so whaling is basically just kind of like spearfishing except it doesn’t have to be collecting fake websites credentials it could be just targeting through any number of means the phone or email stuff like that.

4. Vishing

Now, speaking of the phone there is another type of attack called Vishing which is basically voice phishing so instead of sending emails or sending it through fake websites they may call up and impersonate other employee impersonate a certain company and say when  “Oh we have a fraud alert” and pretend to be a fraud alert “Oh what are the email address and PIN number associated with this account”.

You probably have heard of this kind of attack that called voice phishing its another form of social engineering where basically its a confidence trick where they just talk the person into doing what they want and in this form it just happens to be over the phone.

5. Password Attack

The next kind of attack lets says, for example, a hacker breaks into a website server and downloads the databases of the username and password usually the passwords will be “hashed” they are kind of encrypted so it’s not that they are stored in plain text and the hacker will have to first be able to decrypt those passwords before it can actually use them.

To log in and try other websites and there are few different ways that the hacker might do this one thing is try to brute force the passwords so what they will do is to compare the hash of a randomly generated or sequentially generated string of characters and numbers and compare it to the hashes that it downloads.

When there is a match it knows that person hash is actually this password so with the brute force attack what they will have to do is literally try every single possible combination and they will try on all the passwords at once presumably or compare as many as possible so they will start off with “A” then B then C then D then AA  AB  AC etc.

You have to create a strong password so that no one can hack it. I have written a complete article on how to generate a strong password and you must read this article and make a very strong password for your social media or other accounts.

Follow Us On Facebook

Post a Comment

0 Comments